• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Security   »   Smart Protection Platform: Innovating to Beat the Bad Guys

Smart Protection Platform: Innovating to Beat the Bad Guys

  • Posted on:February 24, 2014
  • Posted in:Security
  • Posted by:
    Leah MacMillan
0

Watching the men’s gold medal hockey game on the final day of the 2014 Olympics, I’m in awe at the quality of play. Hockey is still one of the classic Winter Olympic games, but it has certainly evolved over the past 90 years – faster skating, better stickhandling and harder slap shots – enabled by a continual innovation in equipment and new technology that helps to refine and measure a player’s performance. Of course, one thing that hasn’t changed is the athlete’s unwavering desire to beat the competition.

In our world, beating the competition means staying one step ahead of the hackers that threaten everyone’s livelihoods. For 25 years, our team of threat defense experts has been focused on one mission: making a world safe for exchanging digital information. This means protecting individuals and organizations from the full range of attacks that threaten the safety of their sensitive information – from data leaks to the most sophisticated targeted attacks.

Just like the athletes, we’ve needed to continually evolve our capabilities to compete. Clearly, traditional defenses on their own just don’t cut it anymore, so we’ve delivered complementary, next-generation threat defense techniques to better protect our customers.

With a solid foundation in signature-based scanning approaches (like anti-malware), we’ve added application-specific protection (like application control, behavioral monitoring and vulnerability protection), and more recently, fully context-aware techniques (like sandboxing and investigation using indicators of compromise).

A blend of these capabilities – unified by centralized visibility and control, and fueled by cloud-based global threat intelligence – is delivered as part of the Trend Micro Smart Protection Platform.

In response to the evolving threat landscape and increasingly complex IT environments, this platform delivers:

  • Smart protection for information
  • Simple yet flexible solutions to deploy and manage
  • Security that fits an evolving ecosystem

 

1. Smart protection for information

So what does “smart” protection really mean?

To us, smart protection must enable a full lifecycle of adaptive threat defense – enabling organizations to prevent, detect, analyze and respond to the full range of today’s threats. Smart protection must also be layered across the endpoints, servers and network, while delivering an interconnected threat defense across the organization.

SPN Image #2

 

Prevent:  The first step in any protection strategy for an organization is to assess potential vulnerabilities across their environment, and then proactively protect endpoints, servers and applications accordingly. The Smart Protection Platform delivers capabilities such as anti-malware, intrusion prevention, application control, web and email security, data loss prevention, and encryption – essential capabilities that help protect against a massive volume of known and anticipated threats before they impact the organization.

Detect:  While proactive protection is essential, there will undoubtedly be advanced threats that ‘sneak through’. The Smart Protection Platform delivers capabilities to detect advanced malware, as well as behavior and communications that may be invisible to standard defenses. Capabilities include network-wide threat detection, command and control (C&C) communications alerting, custom sandboxing and application scanning to help confirm the presence of and nature of the threats.

Analyze:  To understand how best to remediate and respond to threats, customers must first fully understand the nature, extent and impact of the attack. In addition to alerting and reporting to guide analysis, the Smart Protection Platform includes the ability to interactively explore correlated threat intelligence, and (coming soon) perform endpoint and server forensics using indicators of compromise.

Respond:  Finally, customers must be able to respond to threats, adapting their protection against future attacks. The Smart Protection Platform includes automated security updates through its cloud-based global threat intelligence, with reporting that helps customers prioritize areas for remediation. Centralized policy creation can help customers adapt their security posture and improve their overall protection.

The Smart Protection Platform includes capabilities that deliver security across endpoints, servers and the network. Each layer is interconnected, effectively ‘talking’ to the others. If an attack or compromise is detected at the network layer, for example, all other layers need to be immediately aware of this new threat in order to have comprehensive protection.

We think that’s pretty smart.

 

2.  Simple yet flexible to deploy and manage

In an IT-constrained environment that is more complex than ever, a smart protection strategy requires solutions that are simple yet flexible to deploy and manage. The Smart Protection Platform delivers three solutions that are packaged to address the most pressing challenges facing our customers:

  • Complete User Protection – leading endpoint, gateway, and messaging and collaboration application security
  • Cloud and Data Center Security – next-gen server security protecting physical, virtual and cloud environments
  • Custom Defense – specialized protection against targeted attacks

Whether customers deploy one or all three solutions, the Smart Protection Platform provides centralized visibility and control of security status across multiple layers to simplify administration and speed time to response.

The platform also offers flexible deployment to best suit the customer needs – with on-premise or “as a service” cloud-based offerings of key capabilities.

Simple and flexible.

 

3.  Security that fits an evolving ecosystem

The consumerization of IT and rapid adoption of emerging technologies for virtualization and cloud have made it more difficult to ‘fit’ security into such complex environments.

Importantly, the Smart Protection Platform delivers security across physical, virtual and cloud environments. And not only has it been designed to fit with the myriad of evolving applications and platforms, it delivers threat insight to leading SIEMs (Security Information and Event Management), and delivers optimized security for Microsoft Exchange, VMware, Amazon Web Services cloud environments and more.

It just has to fit.

With the flame barely extinguished on this Olympic games, I imagine the athletes are already thinking about the next four years and what it will take to beat the competition. Like the athletes, our threat defense experts remain committed to their objective – to make a world safe for exchanging digital information.

Related posts:

  1. Smart Protection Platform: A Team Going for Olympic Gold… In Every Event!
  2. Cloud App Security now Included Free with Smart Protection Complete
  3. SC Magazine Gives Trend Micro Smart Protection Complete a 5-Star Rating
  4. Trend Micro Smart Protection Complete Receives 5-Star Review from SC Magazine

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Trend Micro Offerings Are FedRAMP Authorized and Available on AWS
  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRN® Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.